SCENARIO: Critical servers show signs of erratic behavior within your organization's intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
In what phase of the response will the team extract information from the affected systems without altering original data?
Demetra
3 months agoShawna
3 months agoHector
3 months agoFabiola
4 months agoDeandrea
4 months agoQuiana
4 months agoPamella
4 months agoJeanice
4 months agoSherman
5 months agoLizbeth
5 months agoFelicidad
5 months agoCordelia
5 months agoDelbert
5 months agoYuette
10 months agoCarmela
8 months agoSharan
8 months agoRessie
8 months agoEvan
9 months agoNiesha
10 months agoBarbra
9 months agoKeena
10 months agoTaryn
10 months agoTruman
11 months agoYuriko
11 months agoRyan
9 months agoMiesha
9 months agoCarolann
9 months agoCarisa
10 months agoLeota
11 months agoSalina
11 months ago